Search results for: technology identification
9625 Intelligent Recognition Tools for Industrial Automation
Authors: Amin Nazerzadeh, Afsaneh Nouri Houshyar , Azadeh Noori Hoshyar
Abstract:
With the rapid growing of information technology, the industry and manufacturing systems are becoming more automated. Therefore, achieving the highly accurate automatic systems with reliable security is becoming more critical. Biometrics that refers to identifying individual based on physiological or behavioral traits are unique identifiers provide high reliability and security in different industrial systems. As biometric cannot easily be transferred between individuals or copied, it has been receiving extensive attention. Due to the importance of security applications, this paper provides an overview on biometrics and discuss about background, types and applications of biometric as an effective tool for the industrial applications.Keywords: Industial and manufacturing applications, intelligence and security, information technology, recognition; security technology; biometrics
Procedia PDF Downloads 1559624 Conceptualization and Strategies of Biogas Technology for Rural Development in Nigeria
Authors: Okorowo Cyril Agochi
Abstract:
The main challenge of present world is to harness the energy source which is environment friendly and ecologically balanced. This need has forced to search for other alternate source of energy. But unfortunately the new alternative energy sources like the solar, hydro, wind etc. require huge economical value and technical power to operate, which seem to be very difficult for the developing countries like Nigeria. In the present moment biogas energy can be one and only reliable, easily available and economically feasible source of alternative and renewable source which can be managed by locally available sources and simple technology for secondary schools, tertiary institution and rural villages. This paper is aimed at boosting the energy generation for developing of rural Nigeria, through Biogas.Keywords: bio-gas, energy, environment, nigeria, technology
Procedia PDF Downloads 4799623 Source Identification Model Based on Label Propagation and Graph Ordinary Differential Equations
Authors: Fuyuan Ma, Yuhan Wang, Junhe Zhang, Ying Wang
Abstract:
Identifying the sources of information dissemination is a pivotal task in the study of collective behaviors in networks, enabling us to discern and intercept the critical pathways through which information propagates from its origins. This allows for the control of the information’s dissemination impact in its early stages. Numerous methods for source detection rely on pre-existing, underlying propagation models as prior knowledge. Current models that eschew prior knowledge attempt to harness label propagation algorithms to model the statistical characteristics of propagation states or employ Graph Neural Networks (GNNs) for deep reverse modeling of the diffusion process. These approaches are either deficient in modeling the propagation patterns of information or are constrained by the over-smoothing problem inherent in GNNs, which limits the stacking of sufficient model depth to excavate global propagation patterns. Consequently, we introduce the ODESI model. Initially, the model employs a label propagation algorithm to delineate the distribution density of infected states within a graph structure and extends the representation of infected states from integers to state vectors, which serve as the initial states of nodes. Subsequently, the model constructs a deep architecture based on GNNs-coupled Ordinary Differential Equations (ODEs) to model the global propagation patterns of continuous propagation processes. Addressing the challenges associated with solving ODEs on graphs, we approximate the analytical solutions to reduce computational costs. Finally, we conduct simulation experiments on two real-world social network datasets, and the results affirm the efficacy of our proposed ODESI model in source identification tasks.Keywords: source identification, ordinary differential equations, label propagation, complex networks
Procedia PDF Downloads 209622 An Observation of the Information Technology Research and Development Based on Article Data Mining: A Survey Study on Science Direct
Authors: Muhammet Dursun Kaya, Hasan Asil
Abstract:
One of the most important factors of research and development is the deep insight into the evolutions of scientific development. The state-of-the-art tools and instruments can considerably assist the researchers, and many of the world organizations have become aware of the advantages of data mining for the acquisition of the knowledge required for the unstructured data. This paper was an attempt to review the articles on the information technology published in the past five years with the aid of data mining. A clustering approach was used to study these articles, and the research results revealed that three topics, namely health, innovation, and information systems, have captured the special attention of the researchers.Keywords: information technology, data mining, scientific development, clustering
Procedia PDF Downloads 2789621 Robotic Logging Technology: The Future of Oil Well Logging
Authors: Nitin Lahkar, Rishiraj Goswami
Abstract:
“Oil Well Logging” or the practice of making a detailed record (a well log) of the geologic formations penetrated by a borehole is an important practice in the Oil and Gas industry. Although a lot of research has been undertaken in this field, some basic limitations still exist. One of the main arenas or venues where plethora of problems arises is in logistically challenged areas. Accessibility and availability of efficient manpower, resources and technology is very time consuming, restricted and often costly in these areas. So, in this regard, the main challenge is to decrease the Non Productive Time (NPT) involved in the conventional logging process. The thought for the solution to this problem has given rise to a revolutionary concept called the “Robotic Logging Technology”. Robotic logging technology promises the advent of successful logging in all kinds of wells and trajectories. It consists of a wireless logging tool controlled from the surface. This eliminates the need for the logging truck to be summoned which in turn saves precious rig time. The robotic logging tool here, is designed such that it can move inside the well by different proposed mechanisms and models listed in the full paper as TYPE A, TYPE B and TYPE C. These types are classified on the basis of their operational technology, movement and conditions/wells in which the tool is to be used. Thus, depending on subsurface conditions, energy sources available and convenience the TYPE of Robotic model will be selected. Advantages over Conventional Logging Techniques: Reduction in Non-Productive time, lesser energy requirements, very fast action as compared to all other forms of logging, can perform well in all kinds of well trajectories (vertical/horizontal/inclined).Keywords: robotic logging technology, innovation, geology, geophysics
Procedia PDF Downloads 3069620 Optimize Data Evaluation Metrics for Fraud Detection Using Machine Learning
Authors: Jennifer Leach, Umashanger Thayasivam
Abstract:
The use of technology has benefited society in more ways than one ever thought possible. Unfortunately, though, as society’s knowledge of technology has advanced, so has its knowledge of ways to use technology to manipulate people. This has led to a simultaneous advancement in the world of fraud. Machine learning techniques can offer a possible solution to help decrease this advancement. This research explores how the use of various machine learning techniques can aid in detecting fraudulent activity across two different types of fraudulent data, and the accuracy, precision, recall, and F1 were recorded for each method. Each machine learning model was also tested across five different training and testing splits in order to discover which testing split and technique would lead to the most optimal results.Keywords: data science, fraud detection, machine learning, supervised learning
Procedia PDF Downloads 1959619 On the Resilience of Operational Technology Devices in Penetration Tests
Authors: Marko Schuba, Florian Kessels, Niklas Reitz
Abstract:
Operational technology (OT) controls physical processes in critical infrastructures and economically important industries. With the convergence of OT with classical information technology (IT), rising cybercrime worldwide and the increasingly difficult geopolitical situation, the risks of OT infrastructures being attacked are growing. Classical penetration testing, in which testers take on the role of an attacker, has so far found little acceptance in the OT sector - the risk that a penetration test could do more harm than good seems too great. This paper examines the resilience of various OT systems using typical penetration test tools. It is shown that such a test certainly involves risks, but is also feasible in OT if a cautious approach is taken. Therefore, OT penetration testing should be considered as a tool to improve the cyber security of critical infrastructures.Keywords: penetration testing, OT, ICS, OT security
Procedia PDF Downloads 149618 Digitalization: The Uneven Geography of Information and Communication Technology (ICTS) CTSoss Four Major States in India
Authors: Sanchari Mukhopadhyay
Abstract:
Today, almost the entire realm of human activities are becoming increasingly dependent on the power of information, where through ICTs it is now possible to cater distances and avail various services at a few clicks. In principle, ICTs are thus expected to blur location-specific differences and affiliations of development and bring in an inclusive society at the wake of globalization. However, eventually researchers and policy analysts realized that ICTs are also generating inequality in spite of the hope for an integrated world and widespread social well-being. Regarding this unevenness, location plays a major role as often ICT development is seen to be concentrated into pockets, leaving behind large tracks as underprivileged. Thus, understanding the spatial pattern of ICT development and distribution is significant in relation to exploring the extent to which ICTs are fulfilling the promises or reassuring the existing divisions. In addition, it is also profoundly crucial to investigate how regions are connecting and competing both locally and globally. The focus of the research paper is to evaluate the spatial structure of ICT led development in India. Thereby, it attempts to understand the state level (four selected states) pattern of ICT penetration, the pattern of diffusion across districts with respect to large urban centres and the rural-urban disparity of technology adoption. It also tries to assess the changes in access dynamisms of ICTs as one move away from a large metropolitan city towards the periphery. In brief, the analysis investigates into the tendency towards the uneven growth of development through the identification of the core areas of ICT advancement within the country and its diffusion from the core to the periphery. In order to assess the level of ICT development and rural-urban disparity across the districts of selected states, two indices named ICT Development Index and Rural-Urban Digital Divide Index have been constructed. The study mostly encompasses the latest Census (2011) of the country and TRAI (Telecom Regulatory Authority of India) in some cases.Keywords: ICT development, diffusion, core-periphery, digital divide
Procedia PDF Downloads 3339617 [Keynote Speech]: Bridge Damage Detection Using Frequency Response Function
Authors: Ahmed Noor Al-Qayyim
Abstract:
During the past decades, the bridge structures are considered very important portions of transportation networks, due to the fast urban sprawling. With the failure of bridges that under operating conditions lead to focus on updating the default bridge inspection methodology. The structures health monitoring (SHM) using the vibration response appeared as a promising method to evaluate the condition of structures. The rapid development in the sensors technology and the condition assessment techniques based on the vibration-based damage detection made the SHM an efficient and economical ways to assess the bridges. SHM is set to assess state and expects probable failures of designated bridges. In this paper, a presentation for Frequency Response function method that uses the captured vibration test information of structures to evaluate the structure condition. Furthermore, the main steps of the assessment of bridge using the vibration information are presented. The Frequency Response function method is applied to the experimental data of a full-scale bridge.Keywords: bridge assessment, health monitoring, damage detection, frequency response function (FRF), signal processing, structure identification
Procedia PDF Downloads 3479616 Non-Candida Albicans Candida: Virulence Factors and Species Identification in India
Authors: Satender Saraswat, Dharmendra Prasad Singh, Rajesh Kumar Verma, Swati Sarswat
Abstract:
Background and Purpose: The predominant cause of candidiasis was Candida albicans which has shifted towards non-Candida albicans Candida (NCAC) (Candida species other than the C. albicans). NCAC, earlier considered non-pathogenic or minimally virulent, are now considered a primary cause of morbidity and mortality in immunocompromised. With the NCAC spp. gaining weightage in the clinical cases, this study was conducted to determine the prevalence of NCAC spp. in different clinical specimens and to assess a few of their virulence factors. Material and Methods: Routine samples for bacterial culture and sensitivity, showing colony characteristics like Candida on Blood Agar and microscopic features resembling Candida spp. were processed further. Candida isolates were tested for chlamydospore formation, biochemical tests including sugar fermentation and sugar assimilation tests, and growth at 42oC, colony colour on HiCrome™ Candida Differential Agar, HiCandida Identification Kit and VITEK-2 Compact. Virulence factors like adherence to buccal epithelial cells (ABEC), biofilm formation, hemolytic activity, and production of coagulase enzyme were also tested. Results: Mean age of the patients was 38.46 with a male-female ratio of 1.36:1. 137 Candida isolates were recovered. 45.3% isolates were isolated from urine, 19.7% from vaginal swabs and 13.9% from oropharyngeal swabs. 55 (40.1%) isolates of C. albicans and 82 (59.9%) of NCAC spp. were identified, with C. tropicalis (23.4%) in NCAC. C. albicans (3; 50%) was the commonest species in cases of candidemia. Haemolysin production (85.5%) and ABEC (78.2%) were the major virulence factors in C. albicans. C. tropicalis (59.4%) and C. dubliniensis (50%) showed maximum ABEC. Biofilm forming capacity was higher in C. tropicalis (78.1%) than C. albicans (67%). Conclusion: This study suggests varied prevalence and virulence based on geographical locations, even within a subcontinent. It clearly demarcates the emergence of NCAC and their predominance in different body fluids. Identification of Candida to species level should become a routine in all the laboratories.Keywords: ABEC, NCAC, non-Candida albicans Candida, Vitek-2TM compact
Procedia PDF Downloads 1339615 Analysis of NFC and Biometrics in the Retail Industry
Authors: Ziwei Xu
Abstract:
The increasing emphasis on mobility has driven the application of innovative communication technologies across various industries. In the retail sector, Near Field Communication (NFC) has emerged as a significant and transformative technology, particularly in the payment and retail supermarket sectors. NFC enables new payment methods, such as electronic wallets, and enhances information management in supermarkets, contributing to the growth of the trade. This report presents a comprehensive analysis of NFC technology, focusing on five key aspects. Firstly, it provides an overview of NFC, including its application methods and development history. Additionally, it incorporates Arthur's work on combinatorial evolution to elucidate the emergence and impact of NFC technology, while acknowledging the limitations of the model in analyzing NFC. The report then summarizes the positive influence of NFC on the retail industry along with its associated constraints. Furthermore, it explores the adoption of NFC from both organizational and individual perspectives, employing the Best Predictors of organizational IT adoption and UTAUT2 models, respectively. Finally, the report discusses the potential future replacement of NFC with biometrics technology, highlighting its advantages over NFC and leveraging Arthur's model to investigate its future development prospects.Keywords: innovation, NFC, industry, biometrics
Procedia PDF Downloads 759614 A Futuristic Look at American Indian Nationhood: Zits in Sherman Alexie’s Flight
Authors: Shaimaa Alobaidi
Abstract:
The presentation examines how urbanization opens possibilities for American Indian characters like Zits in Alexie’s Flightto explore new definitionsoftheirtribal self-identification. Zits travels in time and views the world from different bodies, ages, and races; his journeys end with different perspectives on the idea of nationhood as an American Indian. He is an example of Vine Deloria’s statementthat “urban Indians have become the cutting edge of the new Indian nationalism” (248). Flight is chosen because the momentZits leaves the real world for time-traveling adventures is very critical; it is a moment of rage that ends in the mass murder of many Anglo-Americans. The paper focus on the turning point when he returns into his body with new opportunities towards his existence among the majority of anglo-Americans who cannot help but see him American Indian minority in need of help and assistance. Characters, such as Zits, attempt to outlive alienation, and Alexie gives new definitionsof their ethnic nationhood. Futuristicdoes not mean the very far unpredictable future; it is rather a nearpotential future for teenagers of American Indians, like Zits, Arnold, andCoyoteSprings- the band in ReservationBlues; all revolutionary personalitiesin Alexie’s works. They will be analyzed as Gerald Vizenor’s “postindianwarriors” who have the ability to identify Indigenous nationalism in a post-colonial context.Keywords: alienation, self-identification, nationhood, urbanization, postindian
Procedia PDF Downloads 1669613 From Data Processing to Experimental Design and Back Again: A Parameter Identification Problem Based on FRAP Images
Authors: Stepan Papacek, Jiri Jablonsky, Radek Kana, Ctirad Matonoha, Stefan Kindermann
Abstract:
FRAP (Fluorescence Recovery After Photobleaching) is a widely used measurement technique to determine the mobility of fluorescent molecules within living cells. While the experimental setup and protocol for FRAP experiments are usually fixed, data processing part is still under development. In this paper, we formulate and solve the problem of data selection which enhances the processing of FRAP images. We introduce the concept of the irrelevant data set, i.e., the data which are almost not reducing the confidence interval of the estimated parameters and thus could be neglected. Based on sensitivity analysis, we both solve the problem of the optimal data space selection and we find specific conditions for optimizing an important experimental design factor, e.g., the radius of bleach spot. Finally, a theorem announcing less precision of the integrated data approach compared to the full data case is proven; i.e., we claim that the data set represented by the FRAP recovery curve lead to a larger confidence interval compared to the spatio-temporal (full) data.Keywords: FRAP, inverse problem, parameter identification, sensitivity analysis, optimal experimental design
Procedia PDF Downloads 2789612 Performance Evaluation of Soft RoCE over 1 Gigabit Ethernet
Authors: Gurkirat Kaur, Manoj Kumar, Manju Bala
Abstract:
Ethernet is the most influential and widely used technology in the world. With the growing demand of low latency and high throughput technologies like InfiniBand and RoCE, unique features viz. RDMA (Remote Direct Memory Access) have evolved. RDMA is an effective technology which is used for reducing system load and improving performance. InfiniBand is a well known technology which provides high-bandwidth and low-latency and makes optimal use of in-built features like RDMA. With the rapid evolution of InfiniBand technology and Ethernet lacking the RDMA and zero copy protocol, the Ethernet community has came out with a new enhancements that bridges the gap between InfiniBand and Ethernet. By adding the RDMA and zero copy protocol to the Ethernet a new networking technology is evolved, called RDMA over Converged Ethernet (RoCE). RoCE is a standard released by the IBTA standardization body to define RDMA protocol over Ethernet. With the emergence of lossless Ethernet, RoCE uses InfiniBand’s efficient transport to provide the platform for deploying RDMA technology in mainstream data centres over 10GigE, 40GigE and beyond. RoCE provide all of the InfiniBand benefits transport benefits and well established RDMA ecosystem combined with converged Ethernet. In this paper, we evaluate the heterogeneous Linux cluster, having multi nodes with fast interconnects i.e. gigabit Ethernet and Soft RoCE. This paper presents the heterogeneous Linux cluster configuration and evaluates its performance using Intel’s MPI Benchmarks. Our result shows that Soft RoCE is performing better than Ethernet in various performance metrics like bandwidth, latency and throughput.Keywords: ethernet, InfiniBand, RoCE, RDMA, MPI, Soft RoCE
Procedia PDF Downloads 4649611 Dismantling the School-to-Prison Pipeline through Technology: A Literature Review
Authors: Yusra A. Ibrahim
Abstract:
Educational efforts to address the school-to-prison pipeline (STPP) and retain students in school require equipping teachers with evidence-based approaches to handle social-emotional behavior (SEB) needs. One aspect of these efforts involves training teachers to utilize effective and current technologies, thereby reducing SEB challenges faced by students with disabilities in their classrooms. This literature review examines eight studies conducted within the past 10 years (from 2013 to 2023) that focus on enhancing SEB needs of students with disabilities using technology. The review reveals that autism spectrum disorder (ASD), emotional behavioral disorder (EBD), and attention deficit and hyperactivity disorder (ADHD) are the predominant disabilities studied through technology interventions. Additionally, it highlights that these studies focused on examining the effectiveness of technologies in reducing disruptive behaviors, increasing on-task behaviors, reducing anxiety, and promoting social skills.Keywords: school-to-prison pipeline, technology, evidence-based practices, EBD
Procedia PDF Downloads 689610 Sources and Potential Ecological Risks of Heavy Metals in the Sediment Samples From Coastal Area in Ondo, Southwest Nigeria
Authors: Ogundele Lasun Tunde, Ayeku Oluwagbemiga Patrick
Abstract:
Heavy metals are released into the sediments in aquatic environment from both natural and anthropogenic sources and they are considered as worldwide issue due to their deleterious ecological risks and food chain disruption. In this study, sediments samples were collected at three major sites (Awoye, Abereke and Ayetoro) along Ondo coastal area using VanVeen grab sampler. The concentrations of As, Cd, Cr, Cu, Fe, Mn, Ni, Pb, V and Zn were determined by employing Atomic Absorption Spectroscopy (AAS). The combined concentrations data were subjected to Positive Matrix Factorization (PMF) receptor approach for source identification and apportionment. The probable risks that might be posed by heavy metals in the sediment were estimated by potential and integrated ecological risks indices. Among the measured heavy metals, Fe had the average concentrations of 20.38 ± 2.86, 23.56 ± 4.16 and 25.32 ± 4.83 lg/g at Abereke, Awoye and Ayetoro sites, respectively. The PMF resulted in identification of four sources of heavy metals in the sediments. The resolved sources and their percentage contributions were oil exploration (39%), industrial waste/sludge (35%), detrital process (18%) and Mn-sources (8%). Oil exploration activities and industrial wastes are the major sources that contribute heavy metals into the coastal sediments. The major pollutants that posed ecological risks to the local aquatic ecosystem are As, Pb, Cr and Cd (40 B Ei ≤ 80) classifying the sites as moderate risk. The integrate risks values of Awoye, Abereke and Ayetoro are 231.2, 234.0 and 236.4, respectively suggesting that the study areas had a moderate ecological risk. The study showed the suitability of PMF receptor model for source identification of heavy metals in the sediments. Also, the intensive anthropogenic activities and natural sources could largely discharge heavy metals into the study area, which may increase the heavy metal contents of the sediments and further contribute to the associated ecological risk, thus affecting the local aquatic ecosystem.Keywords: positive matrix factorization, sediments, heavy metals, sources, ecological risks
Procedia PDF Downloads 219609 ESRA: An End-to-End System for Re-identification and Anonymization of Swiss Court Decisions
Authors: Joel Niklaus, Matthias Sturmer
Abstract:
The publication of judicial proceedings is a cornerstone of many democracies. It enables the court system to be made accountable by ensuring that justice is made in accordance with the laws. Equally important is privacy, as a fundamental human right (Article 12 in the Declaration of Human Rights). Therefore, it is important that the parties (especially minors, victims, or witnesses) involved in these court decisions be anonymized securely. Today, the anonymization of court decisions in Switzerland is performed either manually or semi-automatically using primitive software. While much research has been conducted on anonymization for tabular data, the literature on anonymization for unstructured text documents is thin and virtually non-existent for court decisions. In 2019, it has been shown that manual anonymization is not secure enough. In 21 of 25 attempted Swiss federal court decisions related to pharmaceutical companies, pharmaceuticals, and legal parties involved could be manually re-identified. This was achieved by linking the decisions with external databases using regular expressions. An automated re-identification system serves as an automated test for the safety of existing anonymizations and thus promotes the right to privacy. Manual anonymization is very expensive (recurring annual costs of over CHF 20M in Switzerland alone, according to an estimation). Consequently, many Swiss courts only publish a fraction of their decisions. An automated anonymization system reduces these costs substantially, further leading to more capacity for publishing court decisions much more comprehensively. For the re-identification system, topic modeling with latent dirichlet allocation is used to cluster an amount of over 500K Swiss court decisions into meaningful related categories. A comprehensive knowledge base with publicly available data (such as social media, newspapers, government documents, geographical information systems, business registers, online address books, obituary portal, web archive, etc.) is constructed to serve as an information hub for re-identifications. For the actual re-identification, a general-purpose language model is fine-tuned on the respective part of the knowledge base for each category of court decisions separately. The input to the model is the court decision to be re-identified, and the output is a probability distribution over named entities constituting possible re-identifications. For the anonymization system, named entity recognition (NER) is used to recognize the tokens that need to be anonymized. Since the focus lies on Swiss court decisions in German, a corpus for Swiss legal texts will be built for training the NER model. The recognized named entities are replaced by the category determined by the NER model and an identifier to preserve context. This work is part of an ongoing research project conducted by an interdisciplinary research consortium. Both a legal analysis and the implementation of the proposed system design ESRA will be performed within the next three years. This study introduces the system design of ESRA, an end-to-end system for re-identification and anonymization of Swiss court decisions. Firstly, the re-identification system tests the safety of existing anonymizations and thus promotes privacy. Secondly, the anonymization system substantially reduces the costs of manual anonymization of court decisions and thus introduces a more comprehensive publication practice.Keywords: artificial intelligence, courts, legal tech, named entity recognition, natural language processing, ·privacy, topic modeling
Procedia PDF Downloads 1489608 Threat Modeling Methodology for Supporting Industrial Control Systems Device Manufacturers and System Integrators
Authors: Raluca Ana Maria Viziteu, Anna Prudnikova
Abstract:
Industrial control systems (ICS) have received much attention in recent years due to the convergence of information technology (IT) and operational technology (OT) that has increased the interdependence of safety and security issues to be considered. These issues require ICS-tailored solutions. That led to the need to creation of a methodology for supporting ICS device manufacturers and system integrators in carrying out threat modeling of embedded ICS devices in a way that guarantees the quality of the identified threats and minimizes subjectivity in the threat identification process. To research, the possibility of creating such a methodology, a set of existing standards, regulations, papers, and publications related to threat modeling in the ICS sector and other sectors was reviewed to identify various existing methodologies and methods used in threat modeling. Furthermore, the most popular ones were tested in an exploratory phase on a specific PLC device. The outcome of this exploratory phase has been used as a basis for defining specific characteristics of ICS embedded devices and their deployment scenarios, identifying the factors that introduce subjectivity in the threat modeling process of such devices, and defining metrics for evaluating the minimum quality requirements of identified threats associated to the deployment of the devices in existing infrastructures. Furthermore, the threat modeling methodology was created based on the previous steps' results. The usability of the methodology was evaluated through a set of standardized threat modeling requirements and a standardized comparison method for threat modeling methodologies. The outcomes of these verification methods confirm that the methodology is effective. The full paper includes the outcome of research on different threat modeling methodologies that can be used in OT, their comparison, and the results of implementing each of them in practice on a PLC device. This research is further used to build a threat modeling methodology tailored to OT environments; a detailed description is included. Moreover, the paper includes results of the evaluation of created methodology based on a set of parameters specifically created to rate threat modeling methodologies.Keywords: device manufacturers, embedded devices, industrial control systems, threat modeling
Procedia PDF Downloads 809607 Overcoming Open Innovation Challenges with Technology Intelligence: Case of Medium-Sized Enterprises
Authors: Akhatjon Nasullaev, Raffaella Manzini, Vincent Frigant
Abstract:
The prior research largely discussed open innovation practices both in large and small and medium-sized enterprises (SMEs). Open Innovation compels firms to observe and analyze the external environment in order to tap new opportunities for inbound and/or outbound flows of knowledge, ideas, work in progress innovations. As SMEs are different from their larger counterparts, they face several limitations in utilizing open innovation activities, such as resource scarcity, unstructured innovation processes and underdeveloped innovation capabilities. Technology intelligence – the process of systematic acquisition, assessment and communication of information about technological trends, opportunities and threats can mitigate this limitation by enabling SMEs to identify technological and market opportunities in timely manner and undertake sound decisions, as well as to realize a ‘first mover advantage’. Several studies highlighted firm-level barriers to successful implementation of open innovation practices in SMEs, namely challenges in partner selection, intellectual property rights and trust, absorptive capacity. This paper aims to investigate the question how technology intelligence can be useful for SMEs to overcome the barriers to effective open innovation. For this, we conduct a case study in four Estonian life-sciences SMEs. Our findings revealed that technology intelligence can support SMEs not only in inbound open innovation (taking into account inclination of most firms toward technology exploration aspects of open innovation) but also outbound open innovation. Furthermore, the results of this study state that, although SMEs conduct technology intelligence in unsystematic and uncoordinated manner, it helped them to increase their innovative performance.Keywords: technology intelligence, open innovation, SMEs, life sciences
Procedia PDF Downloads 1679606 Future Metro Station: Remodeling Underground Environment Based on Experience Scenarios and IoT Technology
Authors: Joo Min Kim, Dongyoun Shin
Abstract:
The project Future Station (FS) seek for a deeper understanding of metro station. The main idea of the project is enhancing the underground environment by combining new architectural design with IoT technology. This research shows the understanding of the metro environment giving references regarding traditional design approaches and IoT combined space design. Based on the analysis, this research presents design alternatives in two metro stations those are chosen for a testbed. It also presents how the FS platform giving a response to travelers and deliver the benefit to metro operators. In conclusion, the project describes methods to build future metro service and platform that understand traveler’s intentions and giving appropriate services back for enhancing travel experience. It basically used contemporary technology such as smart sensing grid, big data analysis, smart building, and machine learning technology.Keywords: future station, digital lifestyle experience, sustainable metro, smart metro, smart city
Procedia PDF Downloads 2999605 Management Control Systems in Post-Incubation: An Investigation of Closed Down High-Technology Start-Ups
Authors: Jochen Edmund Kerschenbauer, Roman Salinger, Daniel Strametz
Abstract:
Insufficient informal communication systems can lead to the first crisis (‘Crisis of Leadership’) for start-ups. Management Control Systems (MCS) are one way for high-technology start-ups to successfully overcome these problems. So far the literature has investigated the incubation of a start-up, but focused less on the post-incubation stage. This paper focuses on the use of MCS in post-incubation and, if failed start-ups agree, on how MCS are used. We conducted 14 semi-structured interviews for this purpose, to obtain our results. The overall conclusion is that the majority of the companies were closed down due to a combination of strategic, operative and financial reasons.Keywords: closed down, high-technology, incubation, levers of control, management control systems, post-incubation, start-ups
Procedia PDF Downloads 10939604 SPR Immunosensor for the Detection of Staphylococcus aureus
Authors: Muhammad Ali Syed, Arshad Saleem Bhatti, Chen-zhong Li, Habib Ali Bokhari
Abstract:
Surface plasmon resonance (SPR) biosensors have emerged as a promising technique for bioanalysis as well as microbial detection and identification. Real time, sensitive, cost effective, and label free detection of biomolecules from complex samples is required for early and accurate diagnosis of infectious diseases. Like many other types of optical techniques, SPR biosensors may also be successfully utilized for microbial detection for accurate, point of care, and rapid results. In the present study, we have utilized a commercially available automated SPR biosensor of BI company to study the microbial detection form water samples spiked with different concentration of Staphylococcus aureus bacterial cells. The gold thin film sensor surface was functionalized to react with proteins such as protein G, which was used for directed immobilization of monoclonal antibodies against Staphylococcus aureus. The results of our work reveal that this immunosensor can be used to detect very small number of bacterial cells with higher sensitivity and specificity. In our case 10^3 cells/ml of water have been successfully detected. Therefore, it may be concluded that this technique has a strong potential to be used in microbial detection and identification.Keywords: surface plasmon resonance (SPR), Staphylococcus aureus, biosensors, microbial detection
Procedia PDF Downloads 4759603 Off-Line Text-Independent Arabic Writer Identification Using Optimum Codebooks
Authors: Ahmed Abdullah Ahmed
Abstract:
The task of recognizing the writer of a handwritten text has been an attractive research problem in the document analysis and recognition community with applications in handwriting forensics, paleography, document examination and handwriting recognition. This research presents an automatic method for writer recognition from digitized images of unconstrained writings. Although a great effort has been made by previous studies to come out with various methods, their performances, especially in terms of accuracy, are fallen short, and room for improvements is still wide open. The proposed technique employs optimal codebook based writer characterization where each writing sample is represented by a set of features computed from two codebooks, beginning and ending. Unlike most of the classical codebook based approaches which segment the writing into graphemes, this study is based on fragmenting a particular area of writing which are beginning and ending strokes. The proposed method starting with contour detection to extract significant information from the handwriting and the curve fragmentation is then employed to categorize the handwriting into Beginning and Ending zones into small fragments. The similar fragments of beginning strokes are grouped together to create Beginning cluster, and similarly, the ending strokes are grouped to create the ending cluster. These two clusters lead to the development of two codebooks (beginning and ending) by choosing the center of every similar fragments group. Writings under study are then represented by computing the probability of occurrence of codebook patterns. The probability distribution is used to characterize each writer. Two writings are then compared by computing distances between their respective probability distribution. The evaluations carried out on ICFHR standard dataset of 206 writers using Beginning and Ending codebooks separately. Finally, the Ending codebook achieved the highest identification rate of 98.23%, which is the best result so far on ICFHR dataset.Keywords: off-line text-independent writer identification, feature extraction, codebook, fragments
Procedia PDF Downloads 5129602 A Cognitive Semantic Analysis of the Metaphorical Extensions of Come out and Take Over
Authors: Raquel Rossini, Edelvais Caldeira
Abstract:
The aim of this work is to investigate the motivation for the metaphorical uses of two verb combinations: come out and take over. Drawing from cognitive semantics theories, image schemas and metaphors, it was attempted to demonstrate that: a) the metaphorical senses of both 'come out' and 'take over' extend from both the verbs and the particles central (spatial) senses in such verb combinations; and b) the particles 'out' and 'over' also contribute to the whole meaning of the verb combinations. In order to do so, a random selection of 579 concordance lines for come out and 1,412 for take over was obtained from the Corpus of Contemporary American English – COCA. One of the main procedures adopted in the present work was the establishment of verb and particle central senses. As per the research questions addressed in this study, they are as follows: a) how does the identification of trajector and landmark help reveal patterns that contribute for the identification of the semantic network of these two verb combinations?; b) what is the relationship between the schematic structures attributed to the particles and the metaphorical uses found in empirical data?; and c) what conceptual metaphors underlie the mappings from the source to the target domains? The results demonstrated that not only the lexical verbs come and take, but also the particles out and over play an important whole in the different meanings of come out and take over. Besides, image schemas and conceptual metaphors were found to be helpful in order to establish the motivations for the metaphorical uses of these linguistic structures.Keywords: cognitive linguistics, English syntax, multi-word verbs, prepositions
Procedia PDF Downloads 1559601 Large Panel Technology Apartments of Yesterday and Today: Quality Aspects
Authors: Barbara Gronostajska
Abstract:
Currently, housing conditions of buildings executed in large panel technology are deteriorating. The article presents modernization solutions implemented throughout the variety of architectural activities (adding of balconies and staircases, connecting apartments) which guarantee very intriguing results that meet the needs and expectations of the modern society.Keywords: housing estate, apartments, flats, modernization, plate blocks
Procedia PDF Downloads 4809600 Planning for a Smart Sustainable Cities: A Case Study
Authors: Ajaykumar Kambekar, Nikita Kalantri
Abstract:
Due to faster urbanization; developing nations will have to look forward towards establishing new planned cities those are environmentally friendly. Due to growth in Information and Communication Technology (ICT), it is evident that the rise of smart cities is witnessed as a promising trend for future growth; however, technology alone cannot make a city as a smart city. Cities must use smart systems to enhance the quality of life of its citizens and to achieve sustainable growth. Recent trends in technology may offer some indication towards harnessing our cities potential as the new engines of sustainable growth. To overcome the problems of mega-urbanization, new concept of smart cities has been introduced. The current research aims to reduce the knowledge gap in urban planning by exploring the concept of smart cities considering sustainability as a major focus. The aim of this paper is to plan for an entire smart city. The paper analyses sustainable development and identifies the key factors for the creation of future smart cities. The study also emphasizes the use of advanced planning and scheduling software such as Microsoft Project (MSP).Keywords: urbanization, planned cities, information and communication technology, sustainable growth
Procedia PDF Downloads 3089599 Exploring a Net-Metering Policy Towards Solar Energy Technology Adoption and Sustainability
Authors: Jane Osei, Kerry Brown, Mehran Nejati
Abstract:
Numerous studies have established that solar energy is the second most prevalent form of alternative renewable energy globally, particularly in regions with abundant sunlight. The adoption and ongoing sustainability of solar technology are pivotal for the transition to renewable energy sources. However, the literature indicates that some countries, especially in the developing world, may impede this transition. Despite various policy initiatives aimed at supporting the adoption of solar technology, the long-term effectiveness of these policies remains uncertain. This study investigates the current policy drivers influencing the success or failure of solar energy technology adoption and sustainability. It employs a qualitative review approach to compare strategies for implementing the net-metering policy incentive in both developing and developed countries, identifying successful and unsuccessful strategies and drawing conclusions on the lessons learned. The study's findings reveal that the effective implementation of net metering depends on regional variations in solar radiation and differing levels of electricity demand across regions. Further, the study found that the implementation of net metering has faced challenges in some countries due to regulatory barriers and bottlenecks that hinder private sector involvement and business sustainability. Economic stability also significantly impacts net metering implementation. This study concludes that governments should strive to balance benefit-sharing to attract more private-sector investment in solar technology while ensuring the viability of government energy regulatory bodies.Keywords: solar energy technology, adoption, sustainability, net-metering
Procedia PDF Downloads 349598 The Evolution of the Human Brain from the Hind Brain to the Fore Brain: Dialectics from the African Perspective in Understanding Stunted Development in Science and Technology
Authors: Philemon Wokoma Iyagba, Obey Onenee Christie
Abstract:
From the hindbrain, which is responsible for motor activities, to the forebrain, responsible for processing information related to complex cognitive activities, the human brain has continued to evolve over the years. This evolution- has been progressive, leading to advancements in science and technology. However, the development of science and technology in Africa, where ancient civilization arguably began, has been retrogressive. Dialectics was done by dissecting different opinions on the reason behind the stunted development of science and technology in Africa. The researchers proposed that the inability to sustain the technological advancements made by early Africans is due to poor or lack of replicability of the African knowledge-based system, almost no or poor documentation of adopted procedures and the approval-seeking mentality that cheaply paved the way for westernization which also led to the adulteration of the African way of life and education without making room for incorporating her identity and proper alignment of her rich cultural heritage in education and her enormous achievements before and during the middle age. This article discussed conceptual issues, with its positions based on established facts, the discussion was based on relevant literature and recommendations were made accordingly.Keywords: forebrain, hindbrain, dialectics from African perspective, development in science and technology
Procedia PDF Downloads 779597 High-Performance Thin-layer Chromatography (HPTLC) Analysis of Multi-Ingredient Traditional Chinese Medicine Supplement
Authors: Martin Cai, Khadijah B. Hashim, Leng Leo, Edmund F. Tian
Abstract:
Analysis of traditional Chinese medicinal (TCM) supplements has always been a laborious task, particularly in the case of multi‐ingredient formulations. Traditionally, herbal extracts are analysed using one or few markers compounds. In the recent years, however, pharmaceutical companies are introducing health supplements of TCM active ingredients to cater to the needs of consumers in the fast-paced society in this age. As such, new problems arise in the aspects of composition identification as well as quality analysis. In most cases of products or supplements formulated with multiple TCM herbs, the chemical composition, and nature of each raw material differs greatly from the others in the formulation. This results in a requirement for individual analytical processes in order to identify the marker compounds in the various botanicals. Thin-layer Chromatography (TLC) is a simple, cost effective, yet well-regarded method for the analysis of natural products, both as a Pharmacopeia-approved method for identification and authentication of herbs, and a great analytical tool for the discovery of chemical compositions in herbal extracts. Recent technical advances introduced High-Performance TLC (HPTLC) where, with the help of automated equipment and improvements on the chromatographic materials, both the quality and reproducibility are greatly improved, allowing for highly standardised analysis with greater details. Here we report an industrial consultancy project with ONI Global Pte Ltd for the analysis of LAC Liver Protector, a TCM formulation aimed at improving liver health. The aim of this study was to identify 4 key components of the supplement using HPTLC, following protocols derived from Chinese Pharmacopeia standards. By comparing the TLC profiles of the supplement to the extracts of the herbs reported in the label, this project proposes a simple and cost-effective analysis of the presence of the 4 marker compounds in the multi‐ingredient formulation by using 4 different HPTLC methods. With the increasing trend of small and medium-sized enterprises (SMEs) bringing natural products and health supplements into the market, it is crucial that the qualities of both raw materials and end products be well-assured for the protection of consumers. With the technology of HPTLC, science can be incorporated to help SMEs with their quality control, thereby ensuring product quality.Keywords: traditional Chinese medicine supplement, high performance thin layer chromatography, active ingredients, product quality
Procedia PDF Downloads 2809596 Impact of Chimerism on Y-STR DNA Determination: Sex Mismatch Analysis
Authors: Anupuma Raina, Ajay P. Balayan, Prateek Pandya, Pankaj Shrivastava, Uma Kanga, Tulika Seth
Abstract:
DNA fingerprinting analysis aids in personal identification for forensic purposes and has always been a driving motivation for law enforcement agencies in almost all countries since its inception. The introduction of DNA markers (Y-STR) has allowed for greater precision and higher discriminatory power in forensic testing. A criminal/ person committing crime after bone marrow transplantation is a rare situation but not an impossible one. Keeping such a situation in mind, a study was carried out to find out the best biological sample to be used for personal identification, especially in forensic situation. We choose a female patient (recipient) and a male donor. The pre transplant sample (blood) and post transplant samples (blood, buccal swab, hair roots) were collected from the recipient (patient). The same were compared with the blood sample of the donor using DNA FP technique. Post transplant samples were collected at different interval of time (15, 30, 60, and 90 days). The study was carried out using Y-STR kit at 23 loci. The results determined discusses the phenomenon of chimerism and its impact on Y-STR. Hair sample was found the most suitable sample which had no donor DNA profiling up to 90 days.Keywords: bone marrow transplantation, chimerism, DNA profiling, Y-STR
Procedia PDF Downloads 145